The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword...
详细信息
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,swords ***,automatic weapons detection is a vital requirement now a *** current research is concerned about the real-time detection of weapons for the surveillance cameras with an implementation of weapon detection using Efficient–*** time datasets,from local surveillance department’s test sessions are used for model training and *** consist of local environment images and videos from different type and resolution cameras that minimize the *** research also contributes in the making of Efficient-Net that is experimented and results in a positive *** results are also been represented in graphs and in calculations for the representation of results during training and results after training are also shown to represent our research ***-Net algorithm gives better results than existing *** using Efficient-Net algorithms the accuracy achieved 98.12%when epochs increase as compared to other algorithms.
In this note, we present the synthesis of secure-by-construction controllers that address safety and security properties simultaneously in cyber-physical systems. Our focus is on studying a specific security property ...
详细信息
Compared to the last decade when the convolution neu-ral network(CNN)dominated the research field,machine learn-ing(ML)algorithms have reached a pivotal moment called the generative artificial intelligence(AI)*** the ...
详细信息
Compared to the last decade when the convolution neu-ral network(CNN)dominated the research field,machine learn-ing(ML)algorithms have reached a pivotal moment called the generative artificial intelligence(AI)*** the emer-gence of large-scale foundation models[1],such as large multi-modal model(LMM)GPT-4[2]and text-to-image generative model DALL·E[3].
Cascaded H-bridge (CHB) MLI have emerged as the preferred choice due to their high quality in output waveforms with low harmonic distortion. However, a key limitation in these inverters lies in the requirement of a de...
详细信息
One of the prominent causes of death for women universally is breast cancer. The number of early deaths is reduced with early detection. Using an ultrasound scan, the data examine the ultrasound images of breast cance...
详细信息
Cybersecurity is one of the most critical sectors of information systems and is considered a strategic priority for many Organizations. Information security investments are a crucial aspect of cybersecurity. However, ...
详细信息
ISBN:
(纸本)9781917204194
Cybersecurity is one of the most critical sectors of information systems and is considered a strategic priority for many Organizations. Information security investments are a crucial aspect of cybersecurity. However, it often happens that the economic decisions, which aim to improve information security, have poor efficiency. One reason is the lack of background on economics of the Chief Information Security Officers who are often not familiar with the evaluation of the non-technical aspects of security, e.g. economics. The other reason is the cultural gap between the different persons related to business management and administration. In this paper we present an interactive - simulation software designed to familiarize the aforementioned persons with information security investments. The software is actually a game that aims to boost learning for all the stakeholders who are involved in the investment process. Α better understanding of the processes, the technical, economic and human factors, along with the cultural convergence of the stakeholders will help boost the efficiency of investments. Design science is used as the research method. The creative method, a brainstorming technique, is combined with the five steps of Design science, i.e. explicate the problem, define the requirements, design and develop the artefact, demonstrate the artefact, and evaluate the artefact, to develop a process framework that will be able to cope with this problem. The artefact is an interactive-simulation platform in which a person could take the decision maker role and (a) deal with events that happen and (b) investigate different aspects of information security investment complexity. The evaluation of the artefact is made with a case study in the Industry, where real world data are used to feed the simulation and real-world decision makers play the game in order to better understand the different aspects of the problem and help us trim and enhance the functioning of the platform.
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos ...
详细信息
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos poses the following challenges:variations of human motion,the complexity of backdrops,motion blurs,occlusions,and restricted camera *** research presents a human activity recognition system to address these challenges by working with drones’red-green-blue(RGB)*** first step in the proposed system involves partitioning videos into frames and then using bilateral filtering to improve the quality of object foregrounds while reducing background interference before converting from RGB to grayscale *** YOLO(You Only Look Once)algorithm detects and extracts humans from each frame,obtaining their skeletons for further *** joint angles,displacement and velocity,histogram of oriented gradients(HOG),3D points,and geodesic Distance are *** features are optimized using Quadratic Discriminant Analysis(QDA)and utilized in a Neuro-Fuzzy Classifier(NFC)for activity ***-world evaluations on the Drone-Action,Unmanned Aerial Vehicle(UAV)-Gesture,and Okutama-Action datasets substantiate the proposed system’s superiority in accuracy rates over existing *** particular,the system obtains recognition rates of 93%for drone action,97%for UAV gestures,and 81%for Okutama-action,demonstrating the system’s reliability and ability to learn human activity from drone videos.
Accurate brain tumors segmentation is essential for precise diagnosis, planning, treatment, and monitoring of the tumor. However, the variations in tumor size, shape, and location, automating this process can be chall...
详细信息
Authentication is a crucial step in the cyber security process that confirms user identities. Even though they are widely used, traditional password based techniques are frequently vulnerable to attacks like guessing ...
详细信息
This article presents a novel five-level transformer-based inverter with inherent boosting abilities specially designed for photovoltaic applications. The key distinction of this proposed inverter lies in its three-le...
详细信息
暂无评论